Read Ahead Material: Cover6 Solutions Virtual Workshops

Read Ahead | Cover6 Solutions Workshops

This guide prepares you for our #PentesterPrep & #SOCAnalystPrep
hands-on cybersecurity training.

First, we want to thank you for your interest in Cover6 Solutions. If you made it this far, that means you have most likely registered for one of our workshops. For that, we are forever grateful, and you will always be considered family to us.

This material summarizes the workshops, the hardware and software requirements, helpful videos, and education references to help you better understand the class content.

Use the tabs below to view the material for your desired workshop.

Workshop Read Ahead
Workshop Summaries

Through real-world, hands-on instruction, and with a focus on network defense, we provide a path to a successful career as a Security Operations Center (SOC) Analyst. #SOCAnalystPrep.

Ever wondered what it is like to be on the front line of defense in the Cybersecurity industry? If so, you may be interested in becoming a Security Operations Center (SOC) Analyst.

SOC Analysts are highly sought-after individuals who identify compromised machines and malicious actors. These individuals utilize defensive security skills and techniques that are commonly used in the industry while working to mitigate any damages that may have occurred.

In this training, participants will oversee a network that is currently under attack. Our students will learn various strategies to help defend against several attack scenarios. A few of the tools and technologies that participants will explore include; Security Onion, Wireshark, Splunk, and Nessus. As a participant, we highly recommended that you perform additional research and self-study to continue and maintain your established knowledge and toolkit.  

The provided content is listed below as a guide for the course and is subject to change. We appreciate your support and hope that you enjoy the training. We look forward to your participation and feedback, as well. 

If you have any additional questions outside of the FAQs, please do not hesitate to reach out to info@cover6solutions.com, and we will be happy to assist you.

Have you ever wanted to learn about what it takes to be a Penetration Tester? Does taking a hands-on practical exam make you nervous?  We are here to help you get past that.

Over five weeks (every Tuesday from 6-9 PM ET), our hands-on “Live” workshop will provide what it takes to begin your journey as a successful #Pentester. Whether you are a beginner or a seasoned professional, this training will teach you offensive techniques to improve your pentesting skills all while making you a better defender.

Throughout the course, we will address and discuss various penetration testing topics, tools, technologies, and methodologies that are commonly used in the industry. By no means are the course and its objectives all-encompassing. As a participant, it is highly recommended that you perform additional research and self-study to continue and maintain your established knowledge and toolkit.  

The provided content is listed below as a guide for the course and is subject to change. We appreciate your support and hope that you enjoy the training. We look forward to your participation and feedback as well.  

If you have any additional questions outside of the FAQs, please do not hesitate to reach out to info@cover6solutions.com and we will be happy to assist you. 

Course Outline 

This course is tailored to assist with the preparation for all offensive (practical) exams. It also includes the five primary exam objectives for the CompTIA Pentest+ Certification which are: 

  1. Planning and Scoping 
  2. Information Gathering and Vulnerability Identification 
  3. Attacks and Exploits 
  4. Penetration Testing Tools 
  5. Reporting and Communication 

Note: This is NOT an official CompTIA Training but but rather preparation for real scenarios you may encounter in pentesting engagements or on the Pentest+ exam. Various tools, techniques and procedures will be covered thus those listed are just examples and are not limited to only those, as material is subject to change. 

Helpful Videos to Prepare you for Class

Breaking into Cybersecurity w/ Tyrone E. Wilson

Home Lab Setup | Building an Effective Cybersecurity Learning Environment

Passive Information Gathering

Active Information Gathering

Understanding the Metasploit Database

Incident Handling & Threat Hunting w/ Security Onion: Gain Hands-On Cybersecurity Experience

IPv6 Enumeration & Attacks

Virtual Security Operations Center (SOC) Analyst Prep Workshop (Live) – FREE Session

Additional Educational References